You are on page 1of 7

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

© 2018 IJSRCSEIT | Volume 3 | Issue 1 | ISSN : 2456-3307

Review on Internet Usage Control Using Access Control


Techniques
R. Sangeetha
Assistant Professor, Department of Information Technology, Hindusthan College of Arts and Science,
Coimbatore, Tamil Nadu, India

ABSTRACT

The contact list is a group of statements. Each statement defines a pattern that would be found in an IP packet.
As each packet comes through an interface with an associated access list, the list is scanned from top to bottom
in the exact order that it was entered—for a pattern that matches the incoming packet. Access list criteria could
be the source address of the traffic, the destination address of the traffic, the upper-layer protocol, or other
information .Cisco provides basic traffic filtering capabilities with access control lists .Access lists can be
configured for all routed network protocols (IP, AppleTalk, and so on) to filter the packets of those protocols as
the packets pass through a router. When creating an access list, you define criteria that are applied to each
packet that is processed by the router; the router decides whether to forward or block each packet on the basis
of whether or not the packet matches the criteria. Typical criteria you define in access lists are packet source
addresses, packet purpose addresses, and upper-layer protocol of the packet. However, each protocol has its
own specific set of criteria that can be clear. For a single access list, you can define multiple criteria in multiple,
separate access list statements. Each of these statements should reference the same identifying name or number,
to tie the statements to the same access list. You can have as many criteria statements as you want, limited only
by the available memory. Of course, the more statements you have, the more hard it will be to comprehend and
manage your access lists. Placement and understanding of the traffic flow is important to understand up front
before you configure an ACL on a router interface.
Keywords : Network Traffic, Network Security, Protocols, Standard ACL, Extended ACL

I. INTRODUCTION ACLs are basically a set of commands, grouped


together by a number or name, that are used to filter
ACLs, known for their ability to filter traffic as it traffic entering or leaving an interface. ACL
either comes into or leaves an interface, can also be commands define specifically which traffic is
used for other purposes, including restricting remote permitted and denied. ACLs are created in Global
access(virtual type terminal, or VTY) to an IOS Configuration mode.By default, switches break up
device, filtering routing information, prioritizing collision domains and routers break up broadcast
traffic with queuing, triggering phone calls with dial- domains.By creating virtual local area network
on-demand routing(DDR), changing the (VLAN), broadcast domains break up in a pure
administrative distance of routes, and specifying switched internetwork. A VLAN is a logical group of
traffic to be protected by an IPSec VPN, among many network users and resources connected
others. administratively defined ports on a switch. When
VLANS created, It will be the ability to create

CSEIT1831216 | Received : 02 Feb 2018 | Accepted : 13 Feb 2018 | January-February-2018 [(3) 1 : 1045-1051 ] 1045
smaller broadcast domains within a layer 2 switched If the IOS doesn’t find a match of packet contents to
internetworks by assigning different ports on the the first ACL statement, the IOS will proceed to the
switch to different sub networks. A VLAN is treated next statement in the list, again going through the
like its own subnet or broadcast domain, meaning same matching process. If the second statement
that frames broadcast onto the network are only matches the packet contents, the IOS executes one of
switched between the ports logically grouped within the two The workstations, hubs, and repeaters
the same VLAN. together form a LAN segment. A LAN segment is also
known as a collision domain since collisions remain
II. III. PROBLEM DEFINITION within the segment. The area within which
broadcasts and multicasts are confined is called a
VLANs were initially intended to allow net- work broadcast domain or LAN. Thus a LAN can consist of
administrators to connect a group of hosts in the one or more LAN segments. Defining broadcast and
same broadcast domain, independent of their collision domains in a LAN depends on how the
physical location. However, today’s enter- prise workstations, hubs, switches, and routers are
administrators use VLANs for a variety of other physically connected together. This means that
purposes, most notably for better scalability and everyone on a LAN must be located in the same area
flexible specification of policies. However, enterprise
administrators have seen many problems of VLANs VLAN's offer a number of advantages over traditional
because VLANs are used for other functions they LAN's. They are:
were not designed for. Understandably, VLANs are at  Performance
best an incomplete solution for some of these  Formation of virtual workgroups
problems. As a result, managing VLANs is one of the  Simplified administration
most challenging tasks they face.  Reduced cost
 Security
So there are some useful motivations that motivates
to use VLANs: III. ROUTING PROTOCOL SECURITY
1)To reduce overhead by limiting the size of each
broadcast domain. Routing security has received varying levels of
2)Better security by putting sensitive devices on attention over the past several years and has recently
separate VLAN. Also making traffic special traffic begun to attract more attention specifically around
separate than main. BGP on the public Internet. Despite this new
ACLs are basically statements that are grouped attention, however, the area most open to attack is
together by either a name or number. Within this often not the Internet's BGP tables but the routing
group of statements, when a packet is processed by systems within your own enterprise network. An
an ACL, the IOS will go through certain steps in enterprise routing infrastructure can easily be
finding a match against the ACL statements. ACLs attacked with MITM and other attacks designed to
are processed top-down by the IOS. Using a top- corrupt or change the routing tables with the
down approach, a packet is compared to the first following results:
statement in the ACL, and if the IOS finds a match  Traffic redirection—In this attack, the adversary
between the packet and the statement, the IOS will is able to redirect traffic, enabling the attacker to
execute one of two actions included with the modify traffic in transit or simply sniff packets.
statement: permit or deny.  Traffic sent to a routing black hole—Here the
attacker is able to send specific routes to null0,

Volume 3, Issue 1, January-February-2018 | www.ijsrcseit.com | UGC Approved Journal [ Journal No : 64718 ] 1046
effectively kicking IP addresses off of the protocol message. In addition, the transport layer
network. protocol (such as TCP for BGP) can further
 Router DoS—Attacking the routing process can complicate message spoofing because of the
result in a crash of the router or a severe difficulty in guessing pseudorandom initial
degradation of service. sequence numbers (assuming a remote attacker).
 Routing protocol DoS—Similar to the attack  Excess packets can be stopped through the use of
previously described against a whole router, a traditional DoS mitigation techniques, which are
routing protocol attack could be launched to stop discussed later in the chapter. Malformed
the routing process from functioning properly. packets, however, are nearly impossible to stop
 Unauthorized route prefix origination—This without the participation of the router vendor.
attack aims to introduce a new prefix into the Only through exhaustive testing and years of
route table that shouldn't be there. The attacker field use do routing protocol implementations
might do this to get a covert attack network to be correctly deal with most malformed messages.
routable throughout the victim network. This is an area of computer security that needs
increased attention, not just in routing protocols
There are four primary attack methods for these but in all network applications.
attacks:
 Configuration modification of existing routers IV. ACCESS CONTROL LIST
 Introduction of a rogue router that participates in
routing with legitimate routers An access control list (ACL) is a list of access control
 Spoofing a valid routing protocol message or entries (ACE). Each ACE in an ACL identifies a
modifying a valid message in transit trustee and specifies the access rights allowed,
 Sending of malformed or excess packets to a denied, or audited for that trustee. The security
routing protocol process descriptor for a securable object can contain two
types of ACLs: a DACL and a SACL.
These four attack methods can be mitigated in the
following ways: A discretionary access control list (DACL) identifies
 To counter configuration modification of existing the trustees that are allowed or denied access to a
routers, you must secure the routers. securable object. When a process tries to access a
 This includes not only the configuration of the securable object, the system checks the ACEs in the
router but also the supporting systems it makes object's DACL to determine whether to grant access
useof, such as TFTP servers. See Chapter 5, to it. If the object does not have a DACL, the system
"Device Hardening," for more information. grants full access to everyone. If the object's DACL
 Anyone can attempt to introduce a rogue router, has no ACEs, the system denies all attempts to access
but to cause damage, the attacker needs the other the object because the DACL does not allow any
routing devices to believe the information that is access rights.
sent. This can most easily be blocked by adding
message authentication to your routing protocol. The system checks the ACEs in sequence until it
More on this subject can be found in the next finds one or more ACEs that allow all the requested
section. Additionally, the routing protocol access rights, or until any of the requested access
message types can be blocked by ACLs from rights are denied. For more information, see How
networks with no need to originate them. DACLs Control Access to an Object. For information
 Message authentication can also help prevent the about how to properly create a DACL, see Creating a
spoofing or modification of a valid routing DACL.

Volume 3, Issue 1, January-February-2018 | www.ijsrcseit.com | UGC Approved Journal [ Journal No : 64718 ] 1047
A system access control list (SACL) enables faculty and student VLANs), allowing concise ACLs
administrators to log attempts to access a secured for traffic sent by user machines (e.g., to ensure only
object. Each ACE specifies the types of access SMTP traffic is allowed to reach the email servers on
attempts by a specified trustee that cause the system the infra- structure VLAN).
to generate a record in the security event log. An
ACE in a SACL can generate audit records when an Preventing Source IP Address Spoofing — Source IP
access attempt fails, when it succeeds, or both. For address spoofing is a serious security problem, since
more information about SACLs, see Audit spoofing allows attackers to evade detection or shift
Generation and SACL Access Right. blame for their attacks to others. Assigning host
addresses from a com- mon IP prefix simplifies the
Do not try to work directly with the contents of an preventive filtering of packets with spoofed source IP
ACL. To ensure that ACLs are semantically correct, addresses. Hosts in the same VLAN are assigned IP
use the appropriate functions to create and addresses from the same subnet(s). This allows
manipulate ACLs. For more information, see Getting network administrators to configure ACLs at the
Information from an ACL and Creating or Modifying VLAN’s gateway router to drop any packets with
an ACL. source IP addresses from other prefixes. Campus 3
does precisely that.
i) SIMPLIFYING ACCESS CONTROL POLICIES
Supporting Quality of Service — Classifying packets
VLANs provide an effective way to enforce access based on IP prefixes applies not only to access
control by directing inter-VLAN traffic through control, but also to quality of service (QoS) policies.
routers. In addition, by allowing administrators to For example, administrators can configure a router to
assign related hosts to IP addresses in the same place IP packets in differ- ent queues (with different
subnet, VLANs simplify access control configuration priority levels) based on the source or destination IP
by making packet classification rules more concise. prefix, if hosts are grouped into VLANs based on
Imposing Access Control Policies — VLANs provide their QoS requirements. None of the campuses in our
a way to restrict communication between hosts. In study apply these kinds of QoS policies.
Fig. 1, router 3 (R3) can apply access control lists
(ACLs) to limit the traffic between hosts H3 and H4 ii) DE-CENTRALIZING NETWORK
that belong to different VLANs. MANAGEMENT
VLANs allow administrators to delegate some
Concise Access Control Lists — Routers and firewalls management tasks to individual departments. VLANs
apply ACLs based on the five-tuple of the source and also simplify network troubleshooting by allowing an
destination IP addresses, the source and destination administrator to observe connectivity from any part
TCP/UDP port numbers, and the protocol. Wildcards of the campus simply by trunking a port to a VLAN.
enable shorter lists of rules for permitting and
denying traffic, which simplifies ACL configuration iii) CONVENTIONAL LOCAL AREA NETWORKS
and also makes efficient use of the limited high-speed
memory (e.g., TCAMs) for applying the rules. VLANs In a traditional local area network (LAN), hosts are
enable more compact ACLs by allowing connected by a network of hubs and switches. The
administrators to group hosts with common access switches cooperate to construct a spanning tree for
control policies into a common IP subnet. For delivering traffic. Each switch forwards Ethernet
example, campus 3 identifies user machines through frames based on its destination MAC address. If the
a small number of IP prefixes (corresponding to the switch contains no forwarding-table entry for the

Volume 3, Issue 1, January-February-2018 | www.ijsrcseit.com | UGC Approved Journal [ Journal No : 64718 ] 1048
frame’s destination MAC address, the switch floods destination IP address to forward the packet to H4 in
each frame over the entire spanning tree. A switch VLAN2. If H4 sends an IP pack- et to H1, then H4’s
learns how to reach a MAC address by remembering router R3 forwards the pack- et based on the IP
the incoming link for frames sent by that MAC routing protocol toward the router announcing H1’s
address and creating a mapping between the MAC IP prefix, and that router would then forward the
address and that port. packet over the spanning tree for VLAN1.

To connect to the rest of the enterprise net- work


(and the rest of the Internet), the island of Ethernet
switches connects to IP routers that forward traffic to
and from remote hosts. Each host interface in the
LAN has an IP address from a common IP prefix (or
set of prefixes). Traffic sent to an IP address in the
same subnet stays within the LAN; the sending host
uses the Address Resolution Protocol (ARP) to deter-
mine the MAC address associated with the
destination IP address. For traffic destined to remote
IP addresses, the host forwards the packets to the
Figure 1 . Communication Between Vlans
gateway router, which forwards packets further
toward their destinations.
VII. ADVANTAGES OF USING ACL

V. COMMUNICATION WITHIN A VLAN


There are several advantages to using Router ACL.
Create the access list before applying it to an
Administrators use VLANs to construct network
interface (or elsewhere), because if you apply a
segments that behave logically like a convention- al
nonexistent access list to an interface and then
LAN but are independent of the physical locations of
proceed to configure the access list, the first
the hosts; for example, hosts H1 and H3 in Fig. 1
statement is put into effect, and the implicit deny
both belong to VLAN1. As in a conventional physical
statement that follows could cause you immediate
LAN, the switches in a VLAN construct a spanning
access problems. Use the statement permit any any if
tree, and use flood- ing and learning to forward
you want to allow all other packets not already
traffic between hosts. For example, the switches S3,
denied. Using the statement permit any any in effect
S4, and S5 form a spanning tree for VLAN2.
avoids denying all other packets with the implicit
deny statement at the end of an access list. Do not
VI. COMMUNICATION BETWEEN VLANS
make your first access list entry permit any any
because all traffic will get through; no packets will
Each host has an IP address from an IP prefix (or
reach the subsequent testing. In fact, once you
prefixes) associated with its VLAN; IP routers
specify permit any any, all traffic not already denied
forward packets based on these prefixes, over paths
will get through.
computed in the routing protocol (e.g., Open
Shortest Path First [OSPF] or Rout- ing Information
Although all access lists end with an implicit deny
Protocol [RIP]). For example, when sending traffic to
statement, we recommend use of an explicit deny
H4, host H3 forwards the packets to its gateway
statement (for example, deny ip any any). On most
router R2, since the destination IP address belongs to
platforms, you can display the count of packets
a different prefix. R2 would then look up the

Volume 3, Issue 1, January-February-2018 | www.ijsrcseit.com | UGC Approved Journal [ Journal No : 64718 ] 1049
denied by issuing the show access-list command, iii)Security
thus finding out more information about who your
access list is disallowing. Only packets denied by VLANs provide an extra measure of security. People
explicit deny statements are counted, which is why belonging to the same group can send broadcast
the explicit deny statement will yield more complete message with the guaranteed assurance that users in
data for you. While you are creating an access list or other groups will not receive these messages.
after it is created, you might want to delete an entry.
VIII. CONCLUSION
You cannot delete an entry from a numbered access
list; trying to do so will delete the entire access list. If The use of access control lists to filter traffic within a
you need to delete an entry, you need to delete the routed network is a critical network security
entire access list and start over. You can delete an practice. ACL’s provide network administrators with
entry from a named access list. Use the no permit or the ability to monitor vulnerable ports and block
no deny command to delete the appropriate entry. In known malicious traffic at key points within a
order to make the purpose of individual statements network. The access control lists in place at the
more scannable and easily understood at a glance, ingress and egress points of a network are a key part
you can write a helpful remark before or after any of the first line of defense. The filtering strategy in
statement by using the remark command. place at the network edges reduces many of the risks
associated with direct network attacks.
If you want to deny access to a particular host or
network and find out if someone from that network Access control lists in place at the WAN and LAN
or host is attempting to gain access, include the log level will guard against compromised or infected
keyword with the corresponding deny statement so systems from attacking vulnerable systems on other
that the packets denied from that source are logged subnets or at other sites. There should be several
for you. access control lists in the router’s configuration for
use on a daily basis, or waiting to be used to block
i) Cost and Time Reduction infected hosts or malicious traffic.

VLANs can reduce the migration cost of stations Network security administrators should be aware of
going from one group to another. Physical the current vulnerabilities so that ACL’s can be
reconfiguration takes time and is costly. Instead of updated and waiting in a router’s configuration
physically moving one station to another segment or before an actual attack begins. This practice can help
even to another switch, it is much easier and quicker isolate an attack quickly and save hundreds of man
to move it by using software. hours that would be required to battle a full scale
outbreak.
ii) Creating Virtual Work Groups

IX. REFERENCES
VLANs can be used to create virtual work groups.
For example, in a campus environment, professors
[1]. MAdFraud: Investigating Ad Fraud in Android
working on the same project can send broadcast
Applications.
messages to one another without the necessity of
[2]. Mining Personal Context-Aware Preferences
belonging to the same department. This can reduce
for Mobile Users.
traffic if the multicasting capability of IP was
previously used.

Volume 3, Issue 1, January-February-2018 | www.ijsrcseit.com | UGC Approved Journal [ Journal No : 64718 ] 1050
[3]. A Flexible Generative Model for Preference
Aggregation.
[4]. Opinion spam and analysis. In Proceedings of
the 2008 International Conference on Web
Search and Networking, WSDM ’08, pages 219-
230, 2008.
[5]. D. M. Blei, A. Y. Ng, and M. I. Jordan. Lantent
dirichlet allocation. Journal of Machine
Learning Research, pages 993-1022, 2003.
[6]. Y. Ge, H. Xiong, C. Liu, and Z.-H. Zhou. A taxi
driving fraud detection system. In Proceedings
of the 2011 IEEE 11th International
Conference Neural Networks, ICNN ’11, pages
181-190, 2011.
[7]. N. Spirin and J. Han, "Survey on web spam
detection: Principles and algorithms," SIGKDD
Explor. Newslett., vol. 13, no. 2, pp. 50-64,
May2012.
[8]. E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and
H. W. Lauw, "Detecting product review
spammers using rating behaviors," in
Proc.19thACMInt. Conf. Inform. Knowl.
Manage., 2010, pp. 939-948.
[9]. W.Dzwinel et al Non multidimensional scaling
and visualization of earth quake cluster over
space and feature space, nonlinear processes in
geophysics 12[2005] pp1-12.
[10]. C.Lomnitz. Fundamentals of Earthquake
prediction [1994].
[11]. B.Gutenberg & C.H. Richtro, Earthquake
magnitude, intensity, energy & acceleration
bulseism soc. Am 36, 105-145 [1996].
[12]. C.Brunk, J.Kelly & Rkohai "Mineset An
integrate system for Visual Data Mining" 1997.
[13]. http://www.dotnetspider.com.
[14]. Xia Qianfang and Ye Xiaohua;National Media
Coverage of SARS Crisis (February to May
2003)[J];Journalism & Communication;2003-
02.
[15]. Tian Weiguang and Li Xiguang;Political Bias of
Media Coverage on China SARS by the US
Media[J];Journalism & Communication;2003-
02

Volume 3, Issue 1, January-February-2018 | www.ijsrcseit.com | UGC Approved Journal [ Journal No : 64718 ] 1051

You might also like